Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 An effective approach to offline Arabic handwriting recognition Al Abodi, Jafaar
2014
40 6 p. 1883-1901
19 p.
artikel
2 An efficient and scalable plagiarism checking system using Bloom filters Geravand, Shahabeddin
2014
40 6 p. 1789-1800
12 p.
artikel
3 An improved remote user authentication scheme with key agreement Kumari, Saru
2014
40 6 p. 1997-2012
16 p.
artikel
4 A novel fuzzy identity based signature scheme based on the short integer solution problem Yao, Yanqing
2014
40 6 p. 1930-1939
10 p.
artikel
5 A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networks Shi, Fei
2014
40 6 p. 1801-1812
12 p.
artikel
6 Behavioral-model-based freehand tracking in a Selection-Move-Release system Feng, Zhiquan
2014
40 6 p. 1827-1837
11 p.
artikel
7 Collaborative trust aware intelligent intrusion detection in VANETs Kumar, Neeraj
2014
40 6 p. 1981-1996
16 p.
artikel
8 Communication storage optimization for static dataflow with access patterns under periodic scheduling and throughput constraint Wang, G.Q.
2014
40 6 p. 1858-1873
16 p.
artikel
9 Defeating buffer overflow attacks via virtualization Tian, Donghai
2014
40 6 p. 1940-1950
11 p.
artikel
10 Defense against SYN flooding attacks: A particle swarm optimization approach Jamali, Shahram
2014
40 6 p. 2013-2025
13 p.
artikel
11 Design and verification of an efficient WISHBONE-based network interface for network on chip Swaminathan, K.
2014
40 6 p. 1838-1857
20 p.
artikel
12 Detecting copy-move forgery under affine transforms for image forensics Li, Leida
2014
40 6 p. 1951-1962
12 p.
artikel
13 Diffusion wavelet-based analysis on traffic matrices by different diffusion operators Tian, Hui
2014
40 6 p. 1874-1882
9 p.
artikel
14 Dynamic stochastic resonance-based improved logo extraction in discrete cosine transform domain Jha, Rajib Kumar
2014
40 6 p. 1917-1929
13 p.
artikel
15 Editorial Board 2014
40 6 p. IFC-
1 p.
artikel
16 Efficient forward secure identity-based shorter signature from lattice Zhang, Xiaojun
2014
40 6 p. 1963-1971
9 p.
artikel
17 Efficient group Diffie–Hellman key agreement protocols Harn, Lein
2014
40 6 p. 1972-1980
9 p.
artikel
18 Introduction to the special issue on Recent advances in security and privacy in distributed communications (third edition) Perez, Gregorio Martinez
2014
40 6 p. 1903-1905
3 p.
artikel
19 Secure Hamming distance based record linkage with malicious adversaries Zhang, Bo
2014
40 6 p. 1906-1916
11 p.
artikel
20 Underground distribution BPL connections with (N +1)-hop repeater systems: A novel capacity mitigation technique Lazaropoulos, Athanasios G.
2014
40 6 p. 1813-1826
14 p.
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland